Share This Author
Efficient Ring-LWE Encryption on 8-Bit AVR Processors
- Zhe Liu, Hwajeong Seo, S. Roy, Johann Großschädl, Howon Kim, I. Verbauwhede
- Computer Science, MathematicsCHES
- 13 September 2015
TLDR
Design and implementation of a private and public key crypto processor and its application to a security system
- Howon Kim, Sunggu Lee
- Computer Science, MathematicsIEEE Trans. Consumer Electron.
- 1 February 2004
TLDR
Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations
- Hwajeong Seo, Howon Kim
- Computer Science, MathematicsJ. Inform. and Commun. Convergence Engineering
- 31 March 2012
TLDR
Secure IoT framework and 2D architecture for End-To-End security
- Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim
- Computer ScienceThe Journal of Supercomputing
- 1 August 2018
TLDR
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
- Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
- Computer ScienceWISA
- 20 August 2015
TLDR
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Tae Hyun Kim, T. Takagi, Dong-Guk Han, Howon Kim, Jongin Lim
- Computer Science, MathematicsCANS
- 8 December 2006
TLDR
Implementation of TinyHash based on Hash Algorithm for Sensor Network
- Hang-Rok Lee, Yong-je Choi, Howon Kim
- Computer Science
- 20 October 2007
TLDR
Improved Computation of Square Roots in Specific Finite Fields
- Dong-Guk Han, Dooho Choi, Howon Kim
- Computer Science, MathematicsIEEE Transactions on Computers
- 1 February 2009
TLDR
A More Compact Representation of XTR Cryptosystem
- Masaaki Shirase, Dong-Guk Han, Y. Hibino, Howon Kim, T. Takagi
- Computer Science, MathematicsIEICE Trans. Fundam. Electron. Commun. Comput…
- 1 October 2008
TLDR
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment
- Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim
- Computer Science, BusinessAPWeb Workshops
- 16 January 2006
TLDR
...
...